WO2014134829A1 - Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée - Google Patents

Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée Download PDF

Info

Publication number
WO2014134829A1
WO2014134829A1 PCT/CN2013/072365 CN2013072365W WO2014134829A1 WO 2014134829 A1 WO2014134829 A1 WO 2014134829A1 CN 2013072365 W CN2013072365 W CN 2013072365W WO 2014134829 A1 WO2014134829 A1 WO 2014134829A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity
subscription
identities
user equipment
secure element
Prior art date
Application number
PCT/CN2013/072365
Other languages
English (en)
Inventor
Silke Holtmanns
Alireza SOHI
Original Assignee
Nokia Corporation
Nokia (China) Investment Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation, Nokia (China) Investment Co., Ltd. filed Critical Nokia Corporation
Priority to PCT/CN2013/072365 priority Critical patent/WO2014134829A1/fr
Priority to CN201380074143.0A priority patent/CN105009617B/zh
Priority to EP13877044.1A priority patent/EP2965553B1/fr
Priority to US14/765,749 priority patent/US9603189B2/en
Publication of WO2014134829A1 publication Critical patent/WO2014134829A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3816Mechanical arrangements for accommodating identification devices, e.g. cards or chips; with connectors for programming identification devices

Definitions

  • Example embodiments of this invention relate generally to mobile communication devices and methods and, more specifically, relate to a secure element with remote provisioning functionality, such as an embedded UICC (eUICC), and enhancements related thereto.
  • eUICC embedded UICC
  • 3G cards are UICC cards and store a network access application such as SIM, USIM or ISIM applications.
  • Previous 2G cards are referred to simply as SIM cards.
  • a conventional UICC card or SIM card is issued by an operator and is used to access operator controlled services.
  • the operator association GSMA requires that a dual SIM device has two IMEIs.
  • a UE for example, a handset or a smart phone
  • multiple SIM card slots can detect when the SIM card has been changed by physical means.
  • a subscription related to a corresponding IMEI as above mentioned may identify, among other things, connectivity networks in which the UE can be used, and the individual settings relating to the subscription. These setting may include a network operator setting and a subscriber identifier of an end user. The end user might be an individual user, but may also be a corporation.
  • the subscription data may be recorded on a small chip on which at least memory areas are arranged for protecting the sensitive parts of the aforementioned settings and loading them into the UE being used.
  • this subscription data maybe encoded on a microcontroller operating as the processor unit for a device.
  • Such a device is generally called a UICC for 3G communication technologies or a SIM for 2G communication technologies which is usually placed in a compact package generally referred to as a UICC card or a SIM card.
  • the network access application which is traditionally stored on a SIM or UICC card can also be stored on other form factor like an embedded chip, a platform mounted chip, a logical unit on a larger processor, a protected memory card or a smart card.
  • the chip may hold one or more sets of subscriptions or applications.
  • the UE has a binding between the IMEI and SIM card slot.
  • Today a dual SIM product has two IMEIs and two SIM card slots. Each physical SIM card slot gets an IMEI assigned and the SIM card slotted into the slot then has the IMEI logically assigned.
  • a method comprising downloading at least one subscription from a secure application manager to a secure element with remote provisioning functionality within a user equipment.
  • the method also comprises determining whether or not to assign an identity related to the at least one subscription.
  • the method further comprises informing the user equipment of the at least one subscription being present upon assignment of the identity.
  • an apparatus comprising means for downloading at least one subscription from a secure application manager to a secure element with remote provisioning functionality within a user equipment.
  • the apparatus also comprises means for determining whether or not to assign an identity related to the at least one subscription.
  • the apparatus further comprises means for informing the user equipment of the at least one subscription being present upon assignment of the identity.
  • an apparatus comprising at least one processor and at least one memory including compute program instructions.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus at least to perform downloading at least one subscription from a secure application manager to a secure element with remote provisioning functionality within a user equipment.
  • the at least one memory and computer program instructions are also configured to, with the at least one processor, cause the apparatus at least to perform determining whether or not to assign an identity related to the at least one subscription.
  • the at least one memory and computer program instructions are further configured to, with the at least one processor, cause the apparatus at least to perform informing the user equipment of the at least one subscription being present upon assignment of the identity.
  • a computer program product comprising at least one computer readable storage medium having a computer readable program code portion stored thereon.
  • the computer readable program code portion comprises program code instructions for downloading at least one subscription from a secure application manager to a secure element with remote provisioning functionality within an user equipment.
  • the computer readable program code portion also comprises program code instructions for determining whether or not to assign an identity related to the at least one subscription.
  • the computer readable program code portion further comprises program code instructions for informing the user equipment of the at least one subscription being present upon assignment of the identity.
  • subscriptions and a pool of identities can be efficiently and flexibly managed and maintained within the UE or from outside, such as the UE manufacturer or remote secure application manager. Further, by checking whether the subscription has been assigned a free identity (for example, IMEI or certificate), the pool of identities (for example, IMEIs or certificates) can be effectively used and therefore efficient utilization of the identity could be achieved.
  • a free identity for example, IMEI or certificate
  • FIG. 1 illustrates a simplified block diagram of a UE that includes a multi-SIM such as a security element that contains more than one subscription;
  • FIG. 2 is a logic flow diagram that illustrates the operation of a method, and a result of execution of computer program instructions embodied on a computer readable medium, in accordance with the example embodiments of this invention.
  • Fig. 3 shows an example message sequence chart showing one possible signaling flow.
  • UICC card is a smart card which contains network access credentials and the corresponding applications, for example, SIM application, USIM application, ISIM application, and C-SIM application.
  • the UE with multiple SIM card slots can detect when the
  • SIM card has been changed by physical means in the classical case.
  • this approach does not work for the eUICC, where subscriptions are downloaded or deleted either directly by the user or remotely from a management server. Since there is only one chip which has a larger number of potential USIM applications (or ISIM/CSIM/SIM), the change or deletion of a subscription in the chip cannot be physically detected by the UE. Also, it would be hard for the users to know the number of subscriptions the UE actually uses, for example, the number of IMEIs really applied. In contrast, this is not a problem in the classical case since only two cards can be inserted if there are two slots.
  • Fig. 1 is a block diagram of a system, such as a mobile system or equipment or, even more generally, a UE 100 (for example, a cellular phone, a smart phone, a tablet computer, or a personal digital assistant (PDA)).
  • the UE 100 includes at least one data processor 102, at least one memory 104 (such as ROM and RAM (for example, DRAM or DRAM in combination with SRAM and/or a disk) that stores computer program code (instructions) 104A for execution by the data processor 102, as well as data that is used/generated during execution of the program code 104A.
  • the stored program code may be assumed in many embodiments to include an operating system (OS) and various application programs.
  • OS operating system
  • application programs application programs.
  • the UE 100 can also include at least one data/address/command bus 106 and at least one secure element 108 with remote provisioning functionality that is operated in accordance with the example embodiments of the present invention.
  • the secure element 108 may store one or more subscriptions (for example, USIM1, USIM2 . . . USIMn).
  • the secure element 108 may take the form of a plug-in card (for example, UICC, memory card), removable chip, or it may be embedded in the UE 100 (for example, physically embedded eUICC or chip). That is, the secure element 108 can be implemented on a removable or non-removable form factor.
  • the secure element 108 can store any number of USIM, SIM, C-SIM applications and/or subscriptions. Additionally, the secure element 108, according to example embodiments of the present invention, may contain subscriptions (USIM/ISIM/CSIM or SIM and related data) used for other applications, for example, banking, ticketing, payment, and WLAN.
  • subscriptions USIM/ISIM/CSIM or SIM and related data
  • the UE 100 can also include other components including two or more radio modules 110 (which may preferably be capable of simultaneous operation) each including at least one wireless transceiver 112 and related baseband (BB) circuitry 114. Additionally, the UE 100 may include appropriate user interface components 116 such as a touch- sensitive display, microphone and speaker(s). As an example, the touch- sensitive display can emulate the operation of a keyboard enabling the user to enter alphanumeric information, as well as to activate various soft command/control buttons. The user may be use the display to view which subscriptions are present or become active in the UE. Alternatively, the UE 100 may also be a terminal without a keyboard or touch-screen, for example, a metering machine, vending machine, or car.
  • a metering machine for example, a metering machine, vending machine, or car.
  • the UE 100 may be embodied as a mobile phone, a tablet, a laptop with cellular capability or any other machine that has cellular communication capability (for example, Internet machines and/or devices capable of machine-to-machine communication).
  • the radio modules 110 can be adapted and configured for operation with any desired type of wireless radio communications including 3G technologies such as WCDMA and 4G technologies such as long term evolution (LTE).
  • 3G technologies such as WCDMA and 4G technologies such as long term evolution (LTE).
  • LTE long term evolution
  • one or more of the radio modules could be configured to operate with a shorter range (local) wireless technology such as Wi-Fi technology or near field communication (NFC).
  • local wireless technology such as Wi-Fi technology or near field communication (NFC).
  • NFC near field communication
  • a secure application manager 118 shown in Fig. 1 may be configured to manage subscriptions, each of which may be linked with a device identity (for example, an IMEI or certificate).
  • the secure application manager 118 may include local data processing capability embodied in at least one processor 120 connected to at least one memory 122 for storing subscriptions 124.
  • the memory 122 may also be used to store a pool of identities (for example IMEIs or certificates.)
  • the secure application manager 118 may include some type of interface (IF) 126 for communicating with the UE 100.
  • the interface 126 may be implemented as one or more of a wired interface and a wireless interface, such as a wireless interface one made via a network operator radio infrastructure.
  • the wireless interface may include but not be limited to a cellular interface or a WLAN interface.
  • the UE 100 may also include an application program interface referred to herein as API 128, which is shown in Fig. 1 to be (logically or physically) interposed between the data processor 102 and the secure element 108.
  • the API 128 may be used by the secure element 108 to inform the UE 100 when various events occur, for example, when a subscription has been downloaded from the secure application manager 118, when a subscription is present, when a subscription has been made active, when an identity (for example, an IMEI or certificate) needs to be assigned to a subscription, or when an identity (for example, an IMEI or certificate) has been assigned to a subscription.
  • the API 128 may comprise a physical interface and one or more commands in a secure element management command set.
  • the API 128 may comprise a flag or indicator which indicates when a (subscription, device identity) binding has been performed or a (subscription, device identity) mapping has been achieved. In this way, the user of the UE would be apprised of the number of subscriptions that reside in or have been downloaded to the secure element 108.
  • the various components of the UE 100 or the secure application manager 118 as shown in Fig. 1 can be implemented as discrete packages. Alternatively, one or more of these components can be integrated into a single package (integrated circuit), such as in a system-on-a-chip (SOC) type of package.
  • SOC system-on-a-chip
  • FIG. 2 shows a logic flow diagram that illustrates the operation of a method 200, and a result of execution of computer program instructions embodied on a computer readable medium, in accordance with the example embodiments of the present invention.
  • At S201 at least one subscription is downloaded from a secure application manager to a secure element with remote provisioning functionality within a UE.
  • the secure application manager may be embodied as a subscription manager (SM).
  • the secure element determines whether or not to assign an identity related to the at least one subscription.
  • the secure element informs the UE of the at least one subscription being present upon assignment of the identity.
  • the method 200 may further comprise providing an initial identity (for example, an IMEI or certificate) to the UE for connection to the secure application manager.
  • the secure element accepts the initial identity from the UE manufacturer during the manufacturing process or originally from a third party which provides the initial identity to the manufacturer, which forwards it to the secure element.
  • determining whether or not to assign the identity related to the at least one subscription of method 200 may further comprise determining whether an identity (for example, the IMEI or certificate) has been assigned to the at least one subscription, and assigning an identity to the at least one subscription if one has not been assigned.
  • the method may further comprise requesting an identity from a pool of identities and assigning the identity to the at least one subscription.
  • the pool of identities are maintained within the UE or by a remote entity from which the pool of identities are downloadable to the UE.
  • the remote entity is a trusted entity and could be embodied as the secure application manager or a server operated by the UE manufacturer.
  • the pool of identities are linked to a same secure element identity (for example, the same UICC chip ID).
  • method 200 further comprises informing the UE of the at least one subscription being present via an API.
  • the UE is informed that the subscription is active or gets activated.
  • method 200 further comprises informing, by a message, the secure application manager of successful installation of the at least one subscription, wherein the message includes the identity (for example, the IMEI or certificate) related to the at least one subscription and an identity of the secure element (for example, a UICC chip ID.)
  • the message includes the identity (for example, the IMEI or certificate) related to the at least one subscription and an identity of the secure element (for example, a UICC chip ID.)
  • the method 200 further comprises establishing a security association with the secure application manager to prevent the identities from being compromised.
  • the embodiments of the invention also encompass a computer program product that comprises computer readable program portion comprising program code instructions, where execution of the program code instructions by at least one processor results in performance of operations that comprise execution of the method of Fig. 2 and the several paragraphs descriptive of Fig. 2.
  • Fig. 3 shows an example message sequence chart showing one possible signaling flow.
  • the flow starts with the UE, at the request of the user, establishing a communication connection with the secure application manager at S301.
  • the UE may use a first identity and a first subscription with respect to the cellular channel.
  • the connection can also be established by a non-cellular channel, for example, a WLAN channel, and therefore only the first identity is used. In this case, the subscription which will be downloaded from the secure application manager would become the first subscription.
  • the subscription Upon successful connection with the secure application manager (for example, the SM), at S302, the subscription will be downloaded to the secure element, for example, eUICC in the example embodiments of the present invention.
  • the secure application manager for example, the SM
  • the subscription will be downloaded to the secure element, for example, eUICC in the example embodiments of the present invention.
  • the secure application manager may store the device identity (for example, an IMEI or certificate) together with the respective subscription. For example, if a downloaded subscription is referred to as subscription 2, the secure application manager may store subscription 2 together with IMEI 2. This may require that the secure application manager receive, from a trusted source, an identity of the UE (for example, IMEI 1) before the download process and that the device identity be known to the eUICC.
  • the device identity for example, an IMEI or certificate
  • the secure element Upon receipt of the subscription, at S303, the secure element (for example, eUICC) checks whether the subscription has been assigned an identity (for example, an IMEI or certificate). If this is not the case, then at S304, the secure element may request a free identity (for example, an unused IMEI or certificate) from the UE.
  • the UE may have a pool of identities (for example, IMEIs or certificates) and assign a free identity (for example, an unused IMEI or certificate) from the pool of unused to the subscription. Similar to keeping a pool of identities in the UE, the pool of identities may be stored in the secure element.
  • the secure element may have a pool of identities (for example, IMEIs or certificates) and assign a free identity (for example, an unused IMEI or certificate) from the pool of unused identities to the subscription.
  • a multi-subscription-enabled UE for example, a multi-SIM-enabled UE
  • two approaches for managing the pool of identities can be followed, which are further described here.
  • a first identity for example, IMEI or certificate
  • Other identities for example, IMEIs or certificates
  • the secure application manager is capable of identifying the manufacturer based on information in the first identity, for example, the TAC information in an IMEI, or information contained in a certificate.
  • the manufacturer assigns at manufacturing a fixed number of identities (for example, IMEIs or certificates) to the UE in dependence on the UE characteristics, for example, storage capacity, transceiver support, and frequency bands.
  • identities for example, IMEIs or certificates
  • the UE would then manage the pool of identities.
  • the identities (for example, IMEIs or certificates) are requested from a trusted entity, for example, the secure application manager as shown at S305 in Fig. 3, or a server operated by the UE manufacturer that keeps the pool of identities (for example, IMEIs or certficates).
  • a trusted entity for example, the secure application manager as shown at S305 in Fig. 3, or a server operated by the UE manufacturer that keeps the pool of identities (for example, IMEIs or certficates).
  • any new subscriptions downloaded to the UE would need to request an IMEI from the secure application manager if the pool of the UE becomes exhausted.
  • the UE and the secure element might be required to prove that the UE is acceptable, secure and trustworthy in order to prevent identities (for example, IMEIs or certificates) from being stolen or compromised.
  • identities for example, IMEIs or certificates
  • a telecommunication system operator may send a subscription to the secure element (for example, eUICC) and needs know whether the UE can be trusted.
  • the secure element for example, eUICC
  • the UE is a personal computer, there might be a risk of cloning of the subscription and loss of revenue. Therefore, if an operator receives an identity (for example, IMEI or certificate), it needs to know if the identity is trustworthy. This proof is of special importance if the secure element (for example, eUICC) is implemented on a removable form factor.
  • the subscription should be the one installed and set to be active, in addition to or in place of a previously-installed subscription, if any.
  • the secure application manager is informed of the successful installation of the downloaded subscription. This could be implemented through a message that may contain the newly- as signed identity (for example, IMEI or certificate) and a secure element identity (for example, a UICC chip ID.)
  • the UE is informed via an API that the downloaded subscription can be made active.
  • both subscriptions could be made active.
  • a confirmation from the secure element for example, the eUICC
  • the user of the UE may be apprised of how many subscriptions could be active and which one(s) of them is (are) now active or become active.
  • an apparatus comprising means for downloading at least one subscription from a secure application manager to a secure element with remote provisioning functionality within a UE.
  • the apparatus also comprises means for determining whether or not to assign an identity (for example, an IMEI or certificate) related to the at least one subscription.
  • the apparatus further comprises means for informing the UE of the at least one subscription being present upon assignment of the identity.
  • an apparatus comprising at least one processor and at least one memory including compute program instructions.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus to perform downloading at least one subscription from a secure application manager to a secure element with remote provisioning functionality within a UE.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, also cause the apparatus to perform determining whether or not to assign an identity related to the at least one subscription.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, further cause the apparatus to perform informing the UE of the at least one subscription being present upon assignment of the identity.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus to further perform providing an initial identity to the user equipment for connection to the secure application manager.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus to further perform accepting the initial identity from a manufacturer of the user equipment during a manufacturing process or from a third party which provides the initial identity to the manufacturer.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus to further perform determining whether the identity has been assigned to the at least one subscription, assigning the identity to the at least one subscription if it has not been assigned or requesting from a pool of identities a free identity and assigning the free identity to the at least one subscription if the identity has been assigned.
  • the pool of identities are maintained within the user equipment or by a remote entity from which the pool of identities are downloadable to the user equipment.
  • pool of identities are linked to a same secure element identity.
  • informing the user equipment of the at least one subscription being present is via an application program interface.
  • the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus to further perform informing, by a message, the secure application manager of successful installation of the at least one subscription, wherein the message includes the identity related to the at least one subscription and an identity of the secure element.
  • the secure element with remote provisioning functionality is implemented on a removable chip or a physically embedded chip.
  • the secure element with remote provisioning functionality is implemented on the removable chip and wherein the at least one memory and computer program instructions are configured to, with the at least one processor, cause the apparatus to further perform establishing a security association with the secure application manager to prevent the identities from being compromised.
  • the various embodiments of the UE can include, but are not limited to, cellular telephones, personal digital assistants (PDAs) having wireless communication capabilities, portable computers having wireless communication capabilities, image capture devices such as digital cameras having wireless communication capabilities, gaming devices having wireless communication capabilities, music storage and playback appliances having wireless communication capabilities, Internet appliances permitting wireless Internet access and browsing, as well as portable units or terminals that incorporate combinations of such functions.
  • PDAs personal digital assistants
  • portable computers having wireless communication capabilities
  • image capture devices such as digital cameras having wireless communication capabilities
  • gaming devices having wireless communication capabilities
  • music storage and playback appliances having wireless communication capabilities
  • Internet appliances permitting wireless Internet access and browsing, as well as portable units or terminals that incorporate combinations of such functions.
  • the various embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the invention is not limited thereto.
  • firmware or software which may be executed by a controller, microprocessor or other computing device, although the invention is not limited thereto.
  • While various aspects of the invention may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
  • Embodiments of the inventions may be practiced in various components such as integrated circuit modules.
  • the design of integrated circuits is by and large a highly automated process.
  • Complex and powerful software tools are available for converting a logic level design into a semiconductor circuit design ready to be etched and formed on a semiconductor substrate.
  • connection means any connection or coupling, either direct or indirect, between two or more elements, and may encompass the presence of one or more intermediate elements between two elements that are “connected” or “couple” together.
  • the coupling or connection between the elements can be physical, logical, or a combination thereof.
  • two elements may be considered to be “connected” or “coupled” together by the use of one or more wires, cables and/or printed electrical connections, as well as by the use of electromagnetic energy, such as electromagnetic energy having wavelengths in the radio frequency region, the microwave region and the optical (both visible and invisible) region, as several non-limiting and non-exhaustive examples.

Abstract

L'invention concerne un procédé, des appareils correspondants, et un produit de programme informatique pour des dispositifs multi-SIM à fonctionnalité SIM incorporée. Le procédé consiste à télécharger au moins un abonnement à partir d'un gestionnaire d'application sécurisé vers un élément sécurisé avec une fonctionnalité de provisionnement à distance dans un équipement utilisateur. Le procédé consiste aussi à déterminer s'il faut ou non assigner une identité associée à l'abonnement ou aux abonnements. Le procédé consiste en outre à informer l'équipement utilisateur du ou des abonnement(s) qui est/sont présent(s) lors de l'assignation de l'identité. Avec les inventions revendiquées, les abonnements et un groupe d'identités peuvent être gérés de manière efficace et flexible et maintenus à distance.
PCT/CN2013/072365 2013-03-08 2013-03-08 Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée WO2014134829A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/CN2013/072365 WO2014134829A1 (fr) 2013-03-08 2013-03-08 Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée
CN201380074143.0A CN105009617B (zh) 2013-03-08 2013-03-08 用于有嵌入的sim功能的多sim设备的方法和装置
EP13877044.1A EP2965553B1 (fr) 2013-03-08 2013-03-08 Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée
US14/765,749 US9603189B2 (en) 2013-03-08 2013-03-08 Method and apparatus for multisim devices with embedded SIM functionality

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/072365 WO2014134829A1 (fr) 2013-03-08 2013-03-08 Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée

Publications (1)

Publication Number Publication Date
WO2014134829A1 true WO2014134829A1 (fr) 2014-09-12

Family

ID=51490591

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/072365 WO2014134829A1 (fr) 2013-03-08 2013-03-08 Procédé et appareil pour dispositifs multi-sim à fonctionnalité sim incorporée

Country Status (4)

Country Link
US (1) US9603189B2 (fr)
EP (1) EP2965553B1 (fr)
CN (1) CN105009617B (fr)
WO (1) WO2014134829A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017182118A1 (fr) * 2016-04-19 2017-10-26 Giesecke+Devrient Mobile Security Gmbh Mémorisation de numéro d'équipement imei

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2518254B (en) 2013-09-13 2020-12-16 Vodafone Ip Licensing Ltd Communicating with a machine to machine device
WO2015076710A1 (fr) * 2013-11-19 2015-05-28 Telefonaktiebolaget L M Ericsson (Publ) Gestion de changements de profils
US10743181B1 (en) * 2014-12-23 2020-08-11 Wells Fargo Bank, N.A. System for binding multiple sim cards to an electronic device
EP3086254A1 (fr) * 2015-04-22 2016-10-26 Gemalto Sa Procédé pour gérer les applications d'un élément sécurisé durant l'actualisation du système opérationnel
WO2017082697A1 (fr) * 2015-11-13 2017-05-18 Samsung Electronics Co., Ltd. Procédé et appareil de téléchargement de profil sur une carte de circuit intégré universelle incorporée de terminal
CN105704702B (zh) * 2016-04-20 2019-02-15 中国联合网络通信集团有限公司 下载卡应用的方法及装置
CN108076479B (zh) * 2016-11-08 2020-01-03 展讯通信(上海)有限公司 多卡移动终端及其业务切换方法、装置
CN108229213B (zh) * 2016-12-15 2020-07-07 中国移动通信有限公司研究院 访问控制方法、系统及电子设备
US10178544B2 (en) * 2016-12-15 2019-01-08 Qualcomm Incorporated Obtaining multiple subscription services from an embedded universal integrated circuit card
CN107315625B (zh) * 2017-06-23 2020-11-06 北京小米移动软件有限公司 Sim卡信息的读取方法、装置及计算机可读存储介质
US10285045B2 (en) * 2017-09-05 2019-05-07 T-Mobile Usa, Inc. Monitoring of embedded subscriber identity modules
US10516978B1 (en) 2018-08-31 2019-12-24 At&T Intellectual Property I, L.P. Network based carrier managed long-term evolution advanced device indication for long-term evolution or other next generation network
US11432124B2 (en) 2018-08-31 2022-08-30 At&T Intellectual Property I, L.P. Storing tracking area identities onto a universal integrated circuit card in advanced networks
CN109450949B (zh) * 2018-12-28 2023-12-15 努比亚技术有限公司 多应用解除号码绑定的方法、移动终端、可读存储介质
US11082831B2 (en) * 2019-06-17 2021-08-03 T-Mobile Usa, Inc. Targeted over-the-air updates
CN113055857B (zh) * 2019-12-28 2022-06-28 华为技术有限公司 一种通信连接的方法及电子设备
US11805397B2 (en) * 2020-07-15 2023-10-31 Apple Inc. IMEI binding and dynamic IMEI provisioning for wireless devices

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050020308A1 (en) 2003-07-23 2005-01-27 David Lai Dynamically binding Subscriber Identity Modules (SIMs)/User Identity Modules (UIMs) with portable communication devices
US20100064361A1 (en) * 2005-09-09 2010-03-11 Microsoft Corporation Securely roaming digital identities
WO2011009496A1 (fr) 2009-07-24 2011-01-27 Telefonaktiebolaget Lm Ericsson (Publ) Identifiants de terminaux dans un réseau de communication
EP2461613A1 (fr) 2010-12-06 2012-06-06 Gemalto SA Procédés et système pour la manipulation de données d'une UICC
CN102870443A (zh) 2010-06-14 2013-01-09 苹果公司 用于在无线网络中提供用户标识数据的装置和方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7289805B2 (en) 2005-03-14 2007-10-30 Newstep Networks Inc. Method and system for providing a temporary subscriber identity to a roaming mobile communications device
US8200736B2 (en) 2007-12-24 2012-06-12 Qualcomm Incorporated Virtual SIM card for mobile handsets
WO2009141919A1 (fr) * 2008-05-23 2009-11-26 Telefonaktiebolaget Lm Ericsson (Publ) Équipement utilisateur ims, son procédé de commande, dispositif hôte et son procédé de commande
US8306505B2 (en) 2010-08-10 2012-11-06 Sierra Wireless, Inc. Method and apparatus for transferring identity information to a wireless device for temporary use
US8924715B2 (en) * 2010-10-28 2014-12-30 Stephan V. Schell Methods and apparatus for storage and execution of access control clients
EP2472925A1 (fr) 2011-01-03 2012-07-04 Gemalto SA Procédé de transmission de données dans un réseau de télécommunications cellulaire

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050020308A1 (en) 2003-07-23 2005-01-27 David Lai Dynamically binding Subscriber Identity Modules (SIMs)/User Identity Modules (UIMs) with portable communication devices
CN1826788A (zh) * 2003-07-23 2006-08-30 创道软件有限公司 动态绑定订户识别模块(sim)/用户识别模块(uim)和便携式通信装置
US20100064361A1 (en) * 2005-09-09 2010-03-11 Microsoft Corporation Securely roaming digital identities
WO2011009496A1 (fr) 2009-07-24 2011-01-27 Telefonaktiebolaget Lm Ericsson (Publ) Identifiants de terminaux dans un réseau de communication
CN102870443A (zh) 2010-06-14 2013-01-09 苹果公司 用于在无线网络中提供用户标识数据的装置和方法
EP2461613A1 (fr) 2010-12-06 2012-06-06 Gemalto SA Procédés et système pour la manipulation de données d'une UICC

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017182118A1 (fr) * 2016-04-19 2017-10-26 Giesecke+Devrient Mobile Security Gmbh Mémorisation de numéro d'équipement imei
EP3664490A1 (fr) 2016-04-19 2020-06-10 Giesecke+Devrient Mobile Security GmbH Mémoire imei
US10979429B2 (en) 2016-04-19 2021-04-13 Giesecke+Devrient Mobile Security Gmbh IMEI storage
US11848929B2 (en) 2016-04-19 2023-12-19 Giesecke+Devrient Mobile Security Gmbh IMEI storage

Also Published As

Publication number Publication date
EP2965553B1 (fr) 2020-02-26
EP2965553A4 (fr) 2016-10-19
EP2965553A1 (fr) 2016-01-13
US20150373778A1 (en) 2015-12-24
US9603189B2 (en) 2017-03-21
CN105009617B (zh) 2020-01-21
CN105009617A (zh) 2015-10-28

Similar Documents

Publication Publication Date Title
US9603189B2 (en) Method and apparatus for multisim devices with embedded SIM functionality
US11153746B2 (en) Method and terminal for keeping subscriber identity module card in standby state
US10638314B2 (en) Method and apparatus for downloading a profile in a wireless communication system
US10015165B2 (en) Methods and apparatus to support GlobalPlatform™ usage on an embedded UICC (eUICC)
CN111480350B (zh) 嵌入式sim卡的数据访问的方法和设备
US10492045B2 (en) Dynamic provisioning of device configuration files for electronic subscriber identity modules
US11039299B2 (en) ESIM card activation method, wireless router, and user terminal
EP2708069B1 (fr) Verrouillage sim pour un environnement à plusieurs sim
US11716612B1 (en) Bootstrap electronic subscriber identity module configuration
KR20200017175A (ko) 전자 장치, 외부 전자 장치 및 외부 전자 장치의 eSIM 관리 방법
US11553328B2 (en) Methods, devices, and computer programs for provisioning or controlling operator profiles in terminals
CN109040169B (zh) 管理配置文件的通信装置和方法
US20240007834A1 (en) Imei binding and dynamic imei provisioning for wireless devices
KR20200017180A (ko) 전자 장치, 외부 전자 장치 및 외부 전자 장치의 eSIM 관리 방법
KR20140075602A (ko) 가입자 인증 모듈의 공장 초기화 방법 및 이를 이용하는 장치
JP2017521938A (ja) バーチャル通信カードの実現方法及び装置
CN115209382A (zh) 用于多个eSIM配置文件的逻辑信道管理
CN113286289A (zh) 一种权限确认方法及电子设备
US20170034694A1 (en) Systems and Methods of Serial Port Enumeration for Multi-Subscription Multi-Standby Communication Devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13877044

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14765749

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2013877044

Country of ref document: EP